JOURNAL ARTICLE

HTOutlier: Hardware Trojan detection with side-channel signature outlier identification

Abstract

Hardware Trojan (HT) is a growing concern for the semiconductor industry. As a non-invasive and inexpensive approach, side-channel analysis methods based on signatures such as power, current, or circuit delay are widely used for HT detection. However, the effectiveness of these methods is greatly challenged by the ever-increasing process variation (PV) effects with technology scaling. In this work, considering the inherent relationship among side-channel signatures in a chip, we formulate the HT detection problem as a signature outlier identification problem, and solve it by comparing each signature with an estimated value from other signatures. Experimental results on benchmark circuits show that the proposed technique is much more effective than existing solutions.

Keywords:
Hardware Trojan Signature (topology) Side channel attack Benchmark (surveying) Trojan Computer science Identification (biology) Outlier Anomaly detection Chip Channel (broadcasting) Process (computing) Power (physics) Computer engineering Embedded system Cryptography Data mining Algorithm Artificial intelligence Computer security Mathematics Telecommunications Physics

Metrics

30
Cited By
2.42
FWCI (Field Weighted Citation Impact)
21
Refs
0.90
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Physical Unclonable Functions (PUFs) and Hardware Security
Physical Sciences →  Computer Science →  Hardware and Architecture
Integrated Circuits and Semiconductor Failure Analysis
Physical Sciences →  Engineering →  Electrical and Electronic Engineering
VLSI and Analog Circuit Testing
Physical Sciences →  Computer Science →  Hardware and Architecture
© 2026 ScienceGate Book Chapters — All rights reserved.